How would the server admin know the real-time location of the victim to spoof the GPS coordinates? How would the admin know if the victim was with others who could verify they weren’t engaged in their device? How could the admin counter legitimate logs from other applications or services the victim might be using at the timestamp of the post?
There are far too many variables to be able to execute this successfully by professionals, let alone a bunch of IT staff.